Additional Resources / Questions
Learning Frida is all about finding stuff online!
We could not possibly cover all there is to know in the span of 90 minutes. Instead, our goal is to empower you and provide concrete examples of situations where as a forensic examiner, you might consider RE to help explain or validate some tricky data.
We recommend following @fridadotre on Twitter as you will be more likely to see when new versions are released.
The release notes often provide working examples you may be able to use in your own reverse engineering.
On June 9th, we hosted a followup Q&A and discussed a number of other interesting resources which are listed below.
- Exploit Writing Tutorial https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows
Another great way to get in touch with a room full of reverse engineering folks is to join the Frida telegram group.
Maddie Stone has an Android application reverse engineering course which focuses on reversing potentially malicious applications.
This lab is all about Android, but in the event you wanted to try your hand at frida on iOS, you can do that! Checkm8/checkra1n has really made this a lot more accessible than it used to be.
There are definitely nuances that make it distinct than Android. Generally speaking, static analysis can also be more tricky!
One great way to get started is with Ivan Rodriguez's free course available for those interested in pursuing iOS RE.